|CyberWatch West – Faculty Development
Training Courses January 2013
CyberWatch West will be offering two 5-week online training courses, one on Digital Forensics and another on Ethical Hacking.
The courses are designed to build faculty knowledge of the content areas with opportunities for hands-on training. They are geared to instructors and faculty with little knowledge in these areas. Although the courses are intended to share best practices with instructors and provide teaching resources in the specific content areas, they are open to non-faculty, as well.
(Upon registration, you will be sent a confirmation email with a payment processing link)
Cost for Each Course
$100 – for CWW Members*
$150 – for CWW Non-Members
*Please note: The $100 CWW Member fee for each 5-week course is fully reimbursable for CWW Members only upon successful completion of the course.
Both courses will be offered online and will consist of a series of weekly synchronous 3-hour sessions, Fridays from 5:00 PM – 8:00 PM, PST. All sessions will be recorded and accessible at the conclusion of the session. Each participant will be given an account to remotely access virtual machines to perform lab exercises and experiments. The virtual machines will be available 24/7 throughout the course and for several weeks after. At the conclusion of the course, instructors can request access to virtual machines to use to teach their own courses during the regular semester.
Vincent Nestler, PhD. Vincent earned his PhD in Instructional Design, and holds various certifications including the Accessdata Certified Examiner (ACE). He is also the author of the Principles of Computer Security Lab Manual, 2nd Ed. and is currently a lecturer at California State University, San Bernardino.
Content Covered in the Courses
The first five week course will cover the area of Digital Forensics. The main software used will be Accessdata’s Forensic Tool Kit (FTK) . FTK consists of the following software packages: FTK-Imager, Registry Viewer, Password Recovery Tool Kit (PRTK) and FTK. Each one of the tools will be covered using forensic images provided by Accessdata as well as using images from the Digital Corpora . The Digital Corpora is a repository of disk images, memory dumps, and other resources for digital forensics education.
|Dates||Course 1 – DIGITAL FORENSICS - CONTENT|
|Introduction to the class, ACE certification, using FTK Imager for creating forensically sound copies of media files|
|Week 2||Jan 25th Using registry viewer and finding artifacts in the Windows Registry|
|Using FTK, processing a forensic image to find digital evidence in email, graphics, indexes of the image and using regular expressions for pattern matching|
|FTK continued and PRTK for cracking passwords.|
|FTK, review of all tools and prep for ACE exam . It will conclude with a discussion of pedagogical issues and how to effectively teach digital forensics in a traditional classroom or at a distance.|
The second five week course will cover the area of Ethical Hacking and will include topics from the Certified Ethical Hacking curriculum. While the course will cover topics on the certified ethical hacking exam, the course will not cover all topics on the exam.
|Dates||Course 2 – ETHICAL HACKING - CONTENT|
|The attack phases: footprinting, scanning, enumeration, system hacking, penetration testing|
|Week 2 Mar 1st||Threats and defense mechanisms: Trojans, backdoors, viruses, and other malware|
|Week 3 Mar 8th||Web applications and data servers: Hacking web servers and web apps|
|Week 4 Mar 15th||Linux, Macintosh, and mobile systems: Hacking Linux and Mac|
|Week 5 Mar 22nd||Secure network infrastructure: wireless networks, physical security, evasion of IDS and firewalls, cryptography|
There will be discussions on various topics related to distance learning technologies, techniques and how to leverage them for greatest transfer of knowledge, skills and abilities. The course will refer to tasks found in the National Institute of Standards and Technology’s National Initiative for Cybersecurity Education (NIST/NICE) . Upon completion of the course, participants should have adequate preparation to take the Accessdata Certified Examiner (ACE) certification and be familiar with the CEH certification requirements .